Strategic Command Directive (SD) 527-1 (). In the TV Series, Crisis, the US government goes to INFOCON 2 when Francis Gibson has a massive cyber attack initiated upon the United States, nearly bringing it to war with China. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only (Answer). Symantec's ThreatCon service no longer exists. Depending on the CPCON level, users may experience disruptions in service or access to physical spaces. Similar concepts in private-sector computing ThreatCon (Symantec) Any compromised systems are isolated from the rest of the network.
Non-essential networks may be taken offline, and alternate methods of communication may be implemented. INFOCON 2 describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness.All unclassified dial-up connections are disconnected. Security review on important systems is a priority, and the Computer Network Defense system's alertness is increased. INFOCON 3 describes when a risk has been identified.Internet usage may be restricted to government sites only, and backing up files to removable media is ideal. Increased monitoring of all network activities is mandated, and all Department of Defense end users must make sure their systems are secure. INFOCON 4 describes an increased risk of attack.
Cpcon 1 2 3 4 password#
Operational performance of all information systems is monitored, and password systems are used as a layer of protection. INFOCON 5 describes a situation where there is no apparent hostile activity against computer networks.There are five levels of INFOCON, which recently changed to more closely correlate to DEFCON levels. 2 Similar concepts in private-sector computing.